Retiree bmail Application
|
|
- Pearl Morris
- 5 years ago
- Views:
Transcription
1 Retiree bmail Application (Get or keep address) UC Berkeley Retirement Center 101 University Hall, Berkeley, CA retirement.berkeley.edu Tel: (510) Fax: (510) Name: Date: UCB Employee ID: Birth Date: Dept. at Retirement: Retirement Date: Home Address: State: Are You Retired: City: Zip: Phone No:! Staff! Emeriti need not complete this form contact your home department Do you currently have a bmail account, or did you have one at retirement?! Yes! No! I certify that I have officially retired or will soon retire from UCB, LBNL, or UCOP and have received a lump-sum payment or pension from UCRS. Note: This service does not provide internet access. You must have a separate Internet Service Provider (ISP), such as AOL, SBC Yahoo!, Comcast, etc. to access your via the internet. Address Your address is usually your CalNet ID followed If you already have address, please list it here. If you do not have account, provide a first and second choice (i.e., yourname@berkeley.edu). address: Payment Information The charge for Retiree bmail is $70 per year, plus a onetime $10 set up fee. Payment by check or money order is due with this application. Make checks out for $80 payable to UC Regents. Please mail or hand-deliver this form with payment to the address above. 2nd Choice: Retiree bmail accounts are available to retirees of UC Berkeley, UCOP and LBNL to facilitate their continued association with the UC Berkeley community. Use of these electronic services is governed by the University of California Electronic Mail Policy and the Berkeley Campus Computer Use and Minimum Security Standards Policies. These services are not to be used for any commercial activities or activities expressly for the purpose of financial gain. I understand that misuse of these services may result in the revocation of these services. I agree to abide by these policies and the terms and conditions for use of these services. Further, I agree to pay the current annual charges for the Retiree bmail service. I understand that payments are to be made on an annual basis and cannot be refunded or prorated. Please allow five to ten business days to process your application. Signature: Date: Center Staff Use only Payment: Check #: Amount: Date Rec d: IST: ed! HCM: Open: From: to By: Closed: By: DB: Entered: By: Closed: By: 01/2014
2 What is a Retiree bmail account? Retiree bmail Service Retiree bmail provides students and staff with a campus address, a calendar, and document sharing service, all linked to the campus contacts directory. Retirees of UC Berkeley, UCOP and LBNL are eligible to have a Retiree bmail account through the UC Berkeley Retirement Center. Retiree bmail is accessed through your own Internet connection or through the web browser on any internet-connected computer. A Retiree bmail account includes all regular account features, including: address and bdrive, bcal, and contacts; the ability to send and receive ; ample (25GB as of June 2013) and document storage space; technical support from bmail consultants at consult@berkeley.edu, ( , ext. 125); and free anti-virus software downloads from Downloads require an active CalNet ID and passphrase (contact UCBRC for details). For details on the bmail and bconnected programs, refer to: Other policies and limitations of the basic bmail service also apply. All Retiree bmail users login with their CalNet ID and CalNet Passphrase. Most often, your CalNet ID followed is your address. If you do not have an active CalNet ID one will be set up for you when your application is processed. What is the charge for a Retiree bmail account? The charge is $70.00 annually, plus a one-time $10 set up fee. This charge is non-refundable and not prorated. Should you cancel your Retiree bmail account you simply will not be billed the following year. As soon as we receive your application at the UC Berkeley Retirement Center, your account will be created, usually within one week. Payment is due with application and may be made by check or money order. How do I pay? Submit your check made out to UC Regents with your application. Annual invoices are sent from the Retirement Center to the address provided on your application. All inquiries regarding your bill or account status should be directed to or via to: ucbrc@berkeley.edu Delinquent Payment Penalties and Procedures: Subsequent payments are due thirty days after you receive your annual invoice; once thirty days has passed, your account will be suspended until payment is received. If your account is suspended, you may lose all contents of your Retiree bmail account. Reinstatement of Service: When the past due amount is paid, your Retiree bmail access will be reinstated within seven business days. How do I cancel? Request for cancellation of your Retiree bmail account should be sent by to ucbrc@berkeley.edu or you can call Include the following information in your cancellation request: Name bmail address Postal Mailing address Phone number Effective date of cancellation Your account may be cancelled without notice if it appears to be associated with any violation of the Terms and Conditions of the UC Berkeley Computer Use Policy. How do I get help? For assistance setting up or accessing your Retiree bmail account, contact the Application Service Center Help Desk: Phone: , ext consult@berkeley.edu Or look online at the CSS Knowledge Base:
3 Revised: April 18, 2013 Minimum Standards for Security of Berkeley Campus Networked Devices The following minimum standards are required for devices connected to the campus network. 1. Software patch updates Campus networked devices must run software for which security patches are made available in a timely fashion. They also must have all currently available security patches installed. Exceptions may be made for patches that compromise the usability of critical applications. 2. Anti-virus software Anti-virus software for any particular type of device currently listed on the Approved Software website must be running and up-to-date on every level of device, including clients, file servers, mail servers, and other types of campus networked devices. 3. Host-based firewall software Host-based firewall software for any particular type of device currently listed on the Approved Software website must be running and configured according to the "Implementing Guidelines for the Minimum Standards for Security of Berkeley Campus Networked Devices", on every level of device, including clients, file servers, mail servers, and other types of campus networked devices. While the use of departmental firewalls is encouraged, they do not necessarily obviate the need for host-based firewalls. 4. Passwords Campus electronic communications systems or services must identify users and authorize access by means of passwords or other secure authentication processes (e.g. biometrics or Smart Cards). When passwords are used, they must meet the Minimum Password Complexity Standards. In addition, shared-access systems must enforce these standards whenever possible and appropriate and require that users change any pre-assigned passwords immediately upon initial access to the account. All default passwords for access to network-accessible devices must be modified. Where possible and appropriate: 1. devices should be configured with separate accounts for privileged and unprivileged access; 2. users should authenticate with an unprivileged account rather than a privileged account; 3. privileged access should occur through a privilege escalation mechanism which allows the log to show which user was granted additional privileges; 4. and privileged access should only be granted for as long as necessary to complete the task which requires additional privileges
4 5. No unencrypted authentication Unencrypted device authentication mechanisms are only as secure as the network upon which they are used. Traffic across the campus network may be surreptitiously monitored, rendering these authentication mechanisms vulnerable to compromise. Therefore, all campus devices must use only encrypted authentication mechanisms unless otherwise authorized by the CISPC. (See "Requests for Exception" in the Berkeley Campus Policy on Minimum Standards for Networked Device Security Configurations.) In particular, historically insecure services such as Telnet, FTP, SNMP, POP, and IMAP must be replaced by their encrypted equivalents. Traffic for one-time password authentication systems (e.g. S/Key, OPIE, SecureID) is exempted from this encryption requirement, because its exposure does not compromise the integrity of the underlying authentication system. 6. No unauthenticated relays Campus devices must not provide an active SMTP service that allows unauthorized third parties to relay messages, i.e., to process an message where neither the sender nor the recipient is a local user. Before transmitting to a non-local address, the sender must authenticate with the SMTP service. Authenticating the machine (e.g. IP address/domain name) rather than the sender is not sufficient to meet this standard. Unless an unauthenticated relay service has been reviewed by SNS and approved by the CISPC as to configuration and appropriate use, it may not operate on the campus network. 7. No unauthenticated proxy services Although properly configured unauthenticated proxy servers may be used for valid purposes, such services commonly exist only as a result of inappropriate device configuration. Unauthenticated proxy servers may enable an attacker to execute malicious programs on the server in the context of an anonymous user account. Therefore, unless an unauthenticated proxy server has been reviewed by SNS and approved by the CISPC as to configuration and appropriate use, it is not allowed on the campus network. In particular, software program default settings in which proxy servers are automatically enabled must be identified by the system administrator and re-configured to prevent unauthenticated proxy services. For more information on the types of software typically used for proxy services, see the "Implementing Guidelines for the Minimum Standards for Security of Berkeley Campus Networked Devices". 8. Physical security Unauthorized physical access to an unattended device can result in harmful or fraudulent modification of data, fraudulent use, or any number of other potentially dangerous situations. In light of this, where possible and appropriate, devices must be configured to "lock" and require a user to re-authenticate if left unattended for more than 20 minutes.
5 9. Unnecessary services If a service is not necessary for the intended purpose or operation of the device, that service shall not be running. The Policy mandating compliance with these Minimum Standards is the Berkeley Campus Policy on Minimum Standards for Networked Device Security Configurations For additional details to assist system administrators and end-users to configure their networked devices to comply with these Minimum Standards see: Appendix B Implementing Guidelines For assistance interpreting these Guidelines, or to request an exception from compliance with the Minimum Standards, contact: security-policy@berkeley.edu. University of California, Berkeley Terms and Conditions of Appropriate use for bmail bmail service users must comply with the bmail Requirements below, as well as with the University of California Electronic Communications Policy (ECP), the Berkeley Campus Computer Use Policy, the Campus Online Activities Policy, and all other laws and policies relevant to their conduct while using a Berkeley Campus electronic communication service. Users of bmail shall not give the impression that they are representing, giving opinions, or otherwise making statements on behalf of the Campus or any department or unit of the Campus unless appropriately authorized to do so. Nevertheless, because communications sent via bmail indicate an individual's affiliation with the University of California, Berkeley, users are expected to show courtesy and consideration in all their bmail communications. bmail users must not waste resources or interfere with others' use of electronic communications services. For example, users shall not send or forward chain letters, send spam, or intentionally engage in other practices such as "denial of service attacks" that impede the availability of electronic communications services. 1. Users must not share their individual account password with others. If an authorized user shares the individual account's password, that authorized user may be held responsible for any misuse of the account that occurred as a result. 2. If a shared use account is needed to conduct University business, a departmental account may be set up. The authorized administrative official who sponsors a departmental account shall be responsible for ensuring appropriate use of that account by all users. 3. Users must not use their bmail account for any commercial use for personal profit, including publishing their bmail address for such commercial activity contacts. Users must not use their bmail account for any commercial use on behalf of other individuals or on behalf of groups, unless authorized by campus administrative officials as being in support of the campus (1).
6 Examples of Misuse: Specific examples of violations of these Terms and Conditions include but are not limited to: * violations of copyright law * sending harassing * knowingly forwarding or originating hoaxes, scams, or other types of fraudulent messages * intentionally sending viruses, worms, or other "malware" * sending unsolicited mass mailings without the consent of all addressees, unless authorized on behalf of the campus by an appropriate administrative official (2) * forging messages or masking the identity of an account * any commercial use for personal profit Non-Compliance In addition to any possible legal sanctions, users who violate these Terms and Conditions of Appropriate Use of bmail may be subject to temporary or permanent service restriction and/or to disciplinary action up to and including dismissal or expulsion. Actions taken in response to alleged violations, as well as avenues available to the user for appeals of actions, will be in accordance with the procedures and due process rights contained in the policy or agreement governing the user's affiliation with the University. General Information For clarification of policies and guidelines applying to Berkeley Campus computing and communications resources, including this Computer Use Policy, contact itpolicy@berkeley.edu. Related policies are available online at the Campus IT policies website. If you would like to obtain paper brochure copies of this Computer Use Policy, including quantities to distribute at your campus location, please contact itpolicy@berkeley.edu. Reporting Misuse Report misuse of campus electronic communication resources to abuse@berkeley.edu.
Minimum Standards for Connecting to the UCLA Network
Minimum Standards for Connecting to the UCLA Network Last April, the CSG approved a set of minimum standards for connecting to the UCLA network that were based on a policy that had been developed by Berkeley.
More informationIMPLEMENTATION POLICY AND PROCEDURES FOR SECURING NETWORKED DEVICES
UNIVERSITY OF CALIFORNIA, BERKELEY BERKELEY DAVIS IRVINE LOS ANGELES RIVERSIDE SAN DIEGO SAN FRANCISCO SANTA BARBARA SANTA CRUZ ECONOMETRICS LABORATORY Institute of Business and Economic Research ECONOMETRICS
More informationMinimum Security Standards for Networked Devices
University of California, Merced Minimum Security Standards for Networked Devices Responsible Official: Chief Information Officer Responsible Office: Information Technology Issuance Date: Effective Date:
More informationII.C.4. Policy: Southeastern Technical College Computer Use
II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer
More informationAcceptable Use Policy
Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.
More informationAcceptable Use Policy
Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable
More informationJacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope
Jacksonville State University Acceptable Use Policy 1. Overview Information Technology s (IT) intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Jacksonville
More informationIT Governance Committee Review and Recommendation
IT Governance Committee Review and Recommendation Desired Change: Approval of this policy will establish Security Standards for the UCLA Logon Identity for anyone assigned a UCLA Logon ID/password and
More informationAcceptable Use Policy
Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established
More informationAcceptable Use Policy
Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech
More informationDONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY
DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an
More informationGuest Wireless Policy
Effective: April 1, 2016 Last Revised: November 27, 2017 Responsible University Office: Information Technology Services Responsible University Administrator: Chief Information Officer Policy Contact: Deb
More informationregion16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
More informationUniversity of Alabama at Birmingham MINIMUM SECURITY FOR COMPUTING DEVICES RULE July 2017
University of Alabama at Birmingham MINIMUM SECURITY FOR COMPUTING DEVICES RULE July 2017 Related Policies, Procedures, and Resources UAB Acceptable Use Policy, UAB Protection and Security Policy, UAB
More informationPGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES
PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES Thank you for choosing a PGTelco Internet as your internet service provider. PGTelco Internet is an affiliate of The Prairie Grove Telephone
More informationREGULATION BOARD OF EDUCATION FRANKLIN BOROUGH
R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources
More informationAcceptable Use Policy (AUP)
Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet
More informationDraft. Policies of Colorado State University University Policy. Category: Information Technology
Policies of Colorado State University University Policy Policy Title: Acceptable Use for Computing and Networking Resources Category: Information Technology Owner: Vice President for Information Technology
More informationAcceptable Use Policy
Acceptable Use Policy Effective: September 2, 2016 Purpose Montreat College is committed to protecting its employees, partners, and itself from illegal or damaging actions by individuals, either knowingly
More informationTable of Contents. PCI Information Security Policy
PCI Information Security Policy Policy Number: ECOMM-P-002 Effective Date: December, 14, 2016 Version Number: 1.0 Date Last Reviewed: December, 14, 2016 Classification: Business, Finance, and Technology
More informationCorporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial
Corporate Policy Information Systems Acceptable Use Document No: ISY-090-10 Effective Date: 2014-06-10 Page 1 of 5 Rev. No: 0 Issuing Policy: Information Systems Department Policy Originator: Erick Edstrom
More informationAcceptable Use Policy
Acceptable Use Policy Why is Cleveland Broadband providing this Policy to me? Cleveland Broadband s goal is to provide its customers with the best Internet service possible. In order to help accomplish
More informationIT ACCEPTABLE USE POLICY
CIO Signature Approval & Date: IT ACCEPTABLE USE POLICY 1.0 PURPOSE The purpose of this policy is to define the acceptable and appropriate use of ModusLink s computing resources. This policy exists to
More information13. Acceptable Use Policy
13. Acceptable Use Policy Purpose Indian River State College s intention for publishing an Acceptable Use Policy is to outline the acceptable use of computer equipment and services at Indian River State
More informationPURPOSE: To establish policies and procedures for the use of University-owned and -operated information technology resources.
MERCER UNIVERSITY SECTION: Policies and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY ACCESS AND USE POLICY EFFECTIVE: January 1, 2004 PURPOSE: To establish policies and procedures for the use of University-owned
More informationElectronic Network Acceptable Use Policy
Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s
More informationQNB Bank-ONLINE AGREEMENT
This is an Agreement between you and QNB Bank ("QNB"). It explains the rules of your electronic access to your accounts through QNB Online. By using QNB-Online, you accept all the terms and conditions
More informationAcceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
More informationPTLGateway Acceptable Use Policy
1 PTLGateway Acceptable Use Policy Last Updated Date: 02 March 2018 Acceptable Use Policy Your use of our Services must fall within our Acceptable Usage Policy. Contents Key details... 1 COVERAGE OF THIS
More informationAcceptable Use Policy
IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations
More informationUCL Policy on Electronic Mail ( )
LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD
More information*Viola Business Fiber Internet**
*Viola Business Fiber Internet** Business Name (Please Print): Address: City: State: Zip: Billing address if different: Business Phone ( ) Cell Phone: ( ) PACKAGES: Check all services for which you are
More informationCELLULAR TELEPHONE EQUIPMENT AND SERVICES POLICY
University Policies and Procedures 10-01.04 - CELLULAR TELEPHONE EQUIPMENT AND SERVICES POLICY I. Policy Statement: Employees must follow the procedures established by this policy to request Towson University
More informationAcceptable Use Policy
Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications
More informationViolations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.
Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist
More informationBUCKEYE INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE INTERNET SERVICE ACCEPTABLE USE POLICY This ("the Policy") governs use of the Buckeye Internet service ("the Service"). All subscribers to the Service are required to comply with this. Failure
More informationTerms of Service. USER means the individual that creates and/or has access to manage or maintain
Terms of Service Tiggee LLC doing business as DNS Made Easy, (hereafter DNS Made Easy or Tiggee ), provides the service ( SERVICE or DNS Made Easy service ) subject to the terms and conditions set forth
More informationBCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)
BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) CLAUSE 13 ON-LINE BIDDING 13.1 ON-LINE BIDDING.1 Definitions: Owner means the party and/or their agent designated to receive on-line
More informationUniversity Network Policies
BACKGROUND Washington State University s network infrastructure and network services are vital to carry out the mission of the University. Policies are needed to ensure the continued integrity of these
More information2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.
1. INTRODUCTION Accesshosting.com's ("AUP") is intended to help enhance the use of the Access Hosting Service by preventing unacceptable use. All users of Accesshosting.com s Access Hosting Services (the
More informationAcceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
More informationFreedomNet Solutions Acceptable Use Policy ( )
FreedomNet Solutions Acceptable Use Policy (02.10.2017) This Acceptable Use Policy ( Acceptable Use ) is a guide to the tolerable use of Member accounts and the Services provided by FreedomNet Solutions.
More informationPRIMUS ACCEPTABLE USE POLICY
PRIMUS ACCEPTABLE USE POLICY For purposes of this Agreement, You, users, and account holders are used interchangeably, and where applicable. These terms are subject to the Privileges and Immunities of
More informationEMPLOYEE USE OF TECHNOLOGY AGREEMENT
2000--ADMINISTRATION 2600--OFFICE TECHNOLOGY EMPLOYEE USE OF TECHNOLOGY AR 2620 Page 1 of 10 EMPLOYEE USE OF TECHNOLOGY AGREEMENT Revised: 4/01/02, 5/24/04, 2/10/10 Superintendent of Schools Page 2 of
More informationInformation Security Management System ISO/IEC 27001:2013
Information Security Management System ISO/IEC 27001:2013 OF ICT FACILITIES PENGGUNAAN KEMUDAHAN ICT For PTM Use Only Date: 7 th June Written By: Junnaini Ismun Pengerusi Jawatankuasa ISMS Verified By:
More informationUniversity Policies and Procedures ELECTRONIC MAIL POLICY
University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must
More informationWireless Communication Stipend Effective Date: 9/1/2008
Category: Financial Policy applicable for: Faculty/Staff Policy Title: Policy Number: Wireless Communication Stipend Effective Date: 9/1/2008 Enabling Act(s) IRS rule 2.1.7 Policy Owner: Sr. VP for Administration
More informationEffective security is a team effort involving the participation and support of everyone who handles Company information and information systems.
BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.
More informationAcceptable Use Policy. Effective January 2017
Acceptable Use Policy Effective January 2017 THIS ACCEPTABLE USE POLICY IS A MATERIAL PART OF ANY AGREEMENT WITH STRAIGHTUPNET COMMUNICATIONS FOR PROVISION OF ITS SERVICES TO BUSINESS AND CONSUMER CUSTOMERS.
More informationWebsite Privacy Policy
Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,
More informationAcceptable Use Policy
Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information
More informationAPPLICATION TO OPEN PORTS THROUGH THE FIREWALL
P: +61 2 9231 3644 E: admin@ccl.com.au W: www.ccl.com.au A.B.N. 72 000 111 Level 1 Selborne Chambers 174 Phillip Street Sydney NSW 2000 APPLICATION TO OPEN PORTS THROUGH THE FIREWALL Only outbound data
More informationClient Computing Security Standard (CCSS)
Client Computing Security Standard (CCSS) 1. Background The purpose of the Client Computing Security Standard (CCSS) is to (a) help protect each user s device from harm, (b) to protect other users devices
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationPOLICY 8200 NETWORK SECURITY
POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:
More informationCalifornia State Polytechnic University, Pomona. Server and Network Security Standard and Guidelines
California State Polytechnic University, Pomona Server and Network Security Standard and Guidelines Version 1.7 April 4, 2008 Table of Contents OVERVIEW...3 AUDIENCE...3 MINIMUM NETWORK AND SERVER SECURITY
More informationGlenwood Telecommunications, Inc. Acceptable Use Policy (AUP)
Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) All customers should read this document. You are responsible for the policy written here, and your account WILL BE DISABLED WITHOUT WARNING
More informationNomination of the. June 4, 2004 PROJECT LEADERS:
Nomination of the Berkeley Campus Information Technology Security Policy and the Minimum Standards for Security of Berkeley Campus Networked Devices for the LARRY SAUTTER AWARD June 4, 2004 PROJECT LEADERS:
More informationICT Acceptable Use Policy for Students
ICT Acceptable Use Policy for Students a 52 Eurobin Avenue, Manly NSW 2095 t +61 2 9977 5144 f +61 2 9976 2753 cricos 03290E e administration@stellamaris.nsw.edu.au w www.stellamaris.nsw.edu.au abn 88
More informationCampus Shared Services
Campus Shared Services UC Berkeley 1608 Fourth Street Berkeley, CA 94710 (510) 664-9000 EXT. 3 Updated 02/27/2018 Visiting Scholars/Visiting Student Researchers Follow-Up Information Campus Shared Services
More informationCleveland State University General Policy for University Information and Technology Resources
Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information
More informationACCEPTABLE USE POLICY (AUP)
ACCEPTABLE USE POLICY (AUP): This Acceptable Use Policy (AUP) is incorporated by reference in your Master Service Agreement with Vlan24, Inc. At its sole discretion, Vlan24, Inc. may suspend or terminate
More informationNebraskaLink Acceptable Use Policy
NebraskaLink Acceptable Use Policy Introduction This acceptable use policy (the "Policy") defines acceptable practices relating to the use of NebraskaLink's services (the "Service") by customers of NebraskaLink
More informationUTAH VALLEY UNIVERSITY Policies and Procedures
Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information
More informationWYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY
WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY Wyandotte Municipal Services may modify this Acceptable Use Policy at any time without notifying its users. For this reason, Wyandotte Services High Speed
More informationSection 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016
Section 3.9 PCI DSS Information Security Policy Issued: vember 2017 Replaces: June 2016 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect
More information1.2 Participant means a third party who interacts with the Services as a result of that party s relationship with or connection to you.
Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 16, 2016. Replaces the prior version in its entirety. Capitalized terms used in these Document Cloud Additional Terms ( Additional
More informationUT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES
ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary
More informationPOLICIES AND PROCEDURES
Integrated Information Technology Services POLICIES AND PROCEDURES Utica College Email POLICY: Email is Utica College s sole accepted mechanism for official electronic communication in the normal conduct
More information: Acceptable Use Policy
: Acceptable Use Policy This Acceptable Use Policy ("Policy") describes the proper and prohibited use of 's Hosting services ("Services") as subscribed to per the Master Service Agreement. This Policy
More informationAcceptable Use Policy Updated 1/16/2018
Acceptable Use Policy Updated 1/16/2018 THIS ACCEPTABLE USE POLICY ( AUP OR POLICY ) IS A MATERIAL PART OF ANY AGREEMENT WITH AIRLINK INTERNET SERVICES, LLC ( AIRLINK ) FOR ACCESS TO AND PROVISION OF BROADBAND
More informationRET CONSTRUCTION MANAGER CERTIFICATION INSTITUTE. Retired Handbook
RET CONSTRUCTION MANAGER CERTIFICATION INSTITUTE Retired Handbook Purpose CCM RETIRED HANDBOOK The (CCM-RET) program has been developed by the Board of Governors to meet the needs of retired professionals
More informationYou are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person.
Middlesex Bank Person to Person Service You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person. This Agreement
More informationThe NIF. Presented by: Berkeley International Office 2299 Piedmont Avenue Berkeley, CA
The NIF Presented by: Berkeley International Office 2299 Piedmont Avenue Berkeley, CA 94720-2321 http://internationaloffice.berkeley.edu What is The NIF? An online database Determines your need for an
More informationCOUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9
ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,
More informationDocument Title: Electronic Data Protection and Encryption Policy. Revision Date Authors Description of Changes
Effective Date: 01/01/2014 Page 1 of 7 REVISION HISTORY Revision No. Revision Date Authors Description of Changes 1.0 11/04/2013 CISO Populate Into Standard Template APPROVED BY This Policy is established
More informationInformation technology security and system integrity policy.
3359-11-10.3 Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values
More informationThe University of Tennessee. Information Technology Policy (ITP) Preamble
Preamble The policy for Use of Information Technology Resources at the University of Tennessee (UT) (Section 135, Part 01, of UT s Fiscal Policy Manual) regulates use of the University's information technology
More informationIGNITE HOSTED PREMIUM MAIL TERMS AND CONDITIONS OF SERVICE. 1. Definitions. 2. Services
IGNITE HOSTED PREMIUM MAIL PLEASE NOTE: These product or service specific terms and conditions must always be read together with our General Terms and Conditions, which will always apply to your use of
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationPolicies & Regulations
Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major
More informationCornish College of the Arts, Information Technology Policy
Table of Contents 1.0 Introduction and Overview 1.1 Mission 1.2 Preamble 1.3 Privacy 1.4 Liability 2.0 Responsibilities and Accountability 2.1 Students 2.2 Faculty and Staff 2.3 Violations of Policy 3.0
More informationAccess to University Data Policy
UNIVERSITY OF OKLAHOMA Health Sciences Center Information Technology Security Policy Access to University Data Policy 1. Purpose This policy defines roles and responsibilities for protecting OUHSC s non-public
More informationSubject: University Information Technology Resource Security Policy: OUTDATED
Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from
More information7.16 INFORMATION TECHNOLOGY SECURITY
7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for
More informationGDPR Draft: Data Access Control and Password Policy
wea.org.uk GDPR Draft: Data Access Control and Password Policy Version Number Date of Issue Department Owner 1.2 21/01/2018 ICT Mark Latham-Hall Version 1.2 last updated 27/04/2018 Page 1 Contents GDPR
More informationTularosa Communications, Inc. (TCI) General Service Terms and Conditions
Tularosa Communications, Inc. (TCI) General Service Terms and Conditions Updated: June 11, 2018 Effective: June 11, 2018 APPLICABILITY These Terms and Conditions apply to all services provided by TCI unless
More informationDomain Hosting Terms and Conditions
Domain Hosting Terms and Conditions Preamble This document may be augmented or replaced by relevant sections of other parts of our Agreement, and should be read in conjunction with other supporting documents,
More information90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government
More information2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY
2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on
More informationConjure Network LLC Privacy Policy
Conjure Network LLC Privacy Policy Effective September 28, 2018 Conjure Network LLC ( Conjure, us, we, or our ) operates http://www.conjure.network (the Site or Website ). This Privacy Policy (the Policy
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationAnnals of Mathematics Electronic License Agreement
Annals of Mathematics Electronic License Agreement Annals of Mathematics, Fine Hall-Washington Road, Princeton University, Princeton, NJ 08544-1000, USA. Fax: 1-609-258-1367 Phone: 1-609-258-4191. By this
More informationInformation Technology Standards
Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this
More informationNORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY
Student Email Use page 1 NEW POLICY SUMMARY: This policy governs the use of email for students. Students do not have an expectation for privacy in their A&T emails. Appropriate and inappropriate uses are
More informationPOLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents
POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND October 2005 Table of Contents Introduction... 1 Purpose Of This Policy... 1 Responsibility... 1 General Policy... 2 Data Classification Policy...
More informationHandbook December 2018
Handbook December 2018 Table of Contents About this Handbook... 3 The EEP Program... 3 Objectives... 3 Benefits... 3 Education Provider Requirements... 4 Fees... 4 Features... 5 Benefits... 6 Application
More informationThis descriptive document is intended as the basis for creation of a functional specification for 2
Introduction & Overview This document provides a framework for the rapid implementation of a certification and access 1 model for non-public Whois data for legitimate and lawful purposes.this model specifically
More informationUCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification
University of California UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification UCOP Implementation Plan for Compliance with Business and Finance Bulletin
More informationInternet Service Provider Agreement
Internet Service Provider Agreement 1. Introduction By using this Internet service ( Service ) you agree to be bound by this Agreement and to use the Service in compliance with this Agreement, our Acceptable
More information